687 lines
39 KiB
Plaintext
687 lines
39 KiB
Plaintext
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
= =
|
||
- WELCOME TO THE FOURTEENTH ISSUE OF -
|
||
= =
|
||
- -=>PHANTASY<=- -
|
||
= =
|
||
- A PUBLICATION AND NEWSLETTER OF -
|
||
= =
|
||
- THE -
|
||
= INTERNATIONAL =
|
||
- INFORMATION -
|
||
= RETRIEVAL =
|
||
- GUILD -
|
||
= =
|
||
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
|
||
= =
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Volume Number Four,Issue Number Fourteen Dated 02/06/93
|
||
Editor is Mercenary : mercenar@works.UUCP
|
||
|
||
Article Submissions: The Mercenary/IIRG
|
||
862 Farmington Avenue
|
||
Suite 306
|
||
Bristol,Ct 06010
|
||
|
||
Phantasy Headquarters BBS: The Rune Stone
|
||
14.4K HST
|
||
Invitation Only
|
||
All H/P/A, 2500+ Files
|
||
(203)-PRI-VATE
|
||
|
||
IIRG World Headquarters BBS: Dark Shadows
|
||
19.2/9600 Baud HST
|
||
1.2 Gigs Online
|
||
(Down at this Time)
|
||
|
||
|
||
Table of Discontents:
|
||
|
||
|
||
[1] Phantasy Distro Sites Needed
|
||
By: IIRG
|
||
|
||
[2] Rune Stone BBS Information
|
||
By: Mercenary
|
||
|
||
[3] "Operation Gray Chip Completed"
|
||
By: Knight Hack
|
||
|
||
[4] FOR THE PEOPLE
|
||
Supplied By: Bulletin Boards Across the Country
|
||
Edited by: Mercenary
|
||
|
||
1. Blitzkrieg BBS Goes Down!
|
||
2. AT&T Smart Card Voice Prints Increase Security of NCR ATMs
|
||
3. DEA Security - Not That Secure!
|
||
|
||
[5] The Rumor Mill (Unconfirmed Rumors From the Underground)
|
||
Edited By: Mercenary
|
||
|
||
1. Possible Loser Alert?
|
||
2. IBM Working on Super Drive?
|
||
3. Grim Reaper of TDT a Narc? (So says Pepsi Man)
|
||
|
||
[6] PHANTASY TIDBITS: News and Views of Interest
|
||
|
||
1. Cellular Highway Robber
|
||
2. Phantasy Makes Honorable Mention
|
||
3. Wired Magazine Premieres
|
||
4. TIME Magazine Article
|
||
5. FREE Virtual Sex Poster
|
||
6. NCSA FREE Book Offer
|
||
7. Information Requests
|
||
|
||
[7] Listing of IIRG Distribution Sites
|
||
|
||
[8] Listing of PHANTASY Distribution Sites
|
||
|
||
[9] IIRG Special Announcements
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
OFFICIAL DISLAIMER...
|
||
|
||
All information in PHANTASY is from USER contributed material
|
||
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
||
any liability from any damages of any type that the reader or
|
||
user of such information contained within this newsletter may encounter
|
||
from the use of said information. All files are brought to you for
|
||
entertainment purposes only! We also assume all information infringes
|
||
no copyrights and hereby disclaim any liability.
|
||
|
||
PHANTASY is (C) 1990 by The IIRG
|
||
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [1]: Phantasy Distro Sites Needed
|
||
By: IIRG
|
||
|
||
|
||
////// ////// /////// ////////
|
||
// // // // //
|
||
// // /////// // ////
|
||
// // // // // //
|
||
////// * ////// * // // * /////////
|
||
|
||
ATTENTION ALL SYSOPS
|
||
--------------------
|
||
|
||
The International Information Retrieval Guild is looking to expand
|
||
its distribution network in 1993. We would prefer BBS's that mainly
|
||
cater to the Hack/Phreak/Anarchy Underground.
|
||
Two Forms of distribution are currently available to those sysops
|
||
who choose to participate and meet certain criteria.
|
||
|
||
1. Phantasy Magazine Distribution
|
||
2. Complete IIRG File Distribution
|
||
|
||
1. Phantasy Distribution
|
||
|
||
Phantasy is the IIRG's Online Newsletter/Magazine for the
|
||
H/P/A community. Phantasy Distribution for your bbs means
|
||
that all new Issues of Phantasy will be uploaded by a courier
|
||
to your BBS within 12-24 Hours of its release date.
|
||
Your only responsibility is to provide a File area.
|
||
|
||
2. IIRG File Distribution
|
||
|
||
The IIRG Archives contain a vast wealth of information
|
||
gathered over the years from the underground. IIRG file
|
||
distribution will provide you with a courier and file list.
|
||
Your responsibility will be to edit the file list to your
|
||
tastes or Needs and provide it to your courier.
|
||
Over a short period of time the courier will provide the
|
||
files you've selected.
|
||
|
||
|
||
As always this is a free service from the IIRG at no
|
||
cost to you, the sysop.
|
||
|
||
LIMITATIONS: The IIRG has no overseas couriers at this
|
||
time, Overseas Sysops will be provided with a No Ratio,
|
||
No Limit Account at an IIRG Distro Site and will be
|
||
responsible for there own distribution until a
|
||
courier can be provided.
|
||
|
||
|
||
The IIRG May be Contacted Through Mercenary at:
|
||
|
||
mercenar@works.UUCP
|
||
|
||
or by Snail Mail at:
|
||
|
||
|
||
Mercenary/IIRG
|
||
862 Farmington Ave.
|
||
Suite 306
|
||
Bristol,CT. 06010
|
||
|
||
|
||
-=THE IIRG=-
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Section [2]: Rune Stone BBS Information
|
||
By: Mercenary
|
||
|
||
|
||
Well Folks, I've got good news and I've got bad news.....
|
||
|
||
First the bad news, The Rune Stones public line will not be installed most
|
||
likely until May of 1993. This is due to the fact that I'm moving again.
|
||
For those IIRG Members with access to the private line, please note that
|
||
that the number will be changing. Please pick up the newest member package.
|
||
My move is prompted by the current economy, hence where the money is, so am I.
|
||
So whem Im settled in at my new location, so will the Rune Stone.
|
||
|
||
Now the good news...
|
||
|
||
The Rune Stone BBS number will be made generally available to all readers of
|
||
Phantasy and when you log-on and become a Validated user,you will have
|
||
access to over 3000 H/P/A Text Files.
|
||
|
||
Please note that due to my changing locations, the next several Issues of
|
||
Phantasy may be slow in appearing as I'll be busy and wont have much time
|
||
to devote to the magazine till after the move.
|
||
|
||
Thanks for the Help and Support
|
||
|
||
Mercenary/IIRG
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Section [3]: "Operation Gray Chip Completed"
|
||
By: Knight Hack
|
||
|
||
|
||
OPERATION GRAY CHIP COMPLETED
|
||
|
||
The FBI,US Customs Service,and Internal Revenue Service along with
|
||
detectives from Santa Clara,San Jose,and Fremont California have just
|
||
completed a four month sting operation code-named "Operation Gray Chip".
|
||
Undercover agents and detectives reportedly bought and sold allegedly
|
||
stolen semiconductors and computer parts on the "Gray" Market.
|
||
The sting operation targeted brokers and dealers in California,Taiwan,
|
||
Argentina, and Singapore. Most of these dealers have reportedly been
|
||
selling parts to legitimate computer companies in the United States and
|
||
Far East for years. Some 30 "Gray" Market brokers have been arrested
|
||
as a result of the sting operation.
|
||
The sting operation is said to have been designed to send a message to
|
||
those who purchase semiconductors,disk drives, and other parts from less
|
||
than legitimate sources According to Sgt. Paul Kirby of the Santa Clara
|
||
Police Department.
|
||
Those individuals arrested have been charged with criminal conspiracy,
|
||
and multiple counts of attempted receipt of stolen property. Names of
|
||
those arrested and the companies involved are expected to be released
|
||
soon.
|
||
Parts for the sting were provided by Intel,Quantam Corp,and Conner
|
||
Peripherals,along with other well known companies. The sting involved
|
||
sales by undercover agents to brokers who thought they were getting a
|
||
deal because the merchandise was HOT.
|
||
More than 2 Million in Cash and 1.55 Million in parts were confiscated
|
||
over the 4 month duration of the operation.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Section [4]: FOR THE PEOPLE
|
||
Supplied By: Bulletin Boards Across the Country
|
||
Edited by: Mercenary
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
% %
|
||
% The end of Blitzkrieg %
|
||
% %
|
||
% Transcribed by Phantasm [01/09/93] %
|
||
% %
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
|
||
The following text is transcribed from a message which was left on Predat0rs
|
||
answering machine at 502-499-8933.
|
||
|
||
Hello, this is John or Predat0r the former SysOp for Blitzkrieg BBS. I'd like
|
||
to say as of the 12th of January, 5.00pm, 502-499-8933 will no longer be an
|
||
active line which means the system's gone.
|
||
|
||
When I get a new line and a new number I'll put it on Pentavia, Ripco, other
|
||
real popular boards like that. I'd like to say thanks for everybody who
|
||
supported the system while it was up.
|
||
|
||
From February of 1990 to January 1993 it had 27,834 callers. The last official
|
||
user to call was Sinister Solution.
|
||
|
||
I'd like to say when the new system goes back up it'll be bigger, better and
|
||
even more underground than it was now.
|
||
|
||
I officially retire as Predat0r and I officially retire Blitzkrieg. So when the
|
||
new system goes up, I'll have a new handle and a new name for the board.
|
||
|
||
If you need to get in touch with me, use the post office box, there still good
|
||
and if you want my new voice number you'll figure out how to get it.
|
||
|
||
Stay free and I'll see you all again real soon...
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
|
||
FOR RELEASE TUESDAY, DECEMBER 8, 1992
|
||
|
||
AT&T SMART CARD VOICE PRINTS INCREASE SECURITY OF NCR ATMs
|
||
|
||
SAN ANTONIO, Texas -- NCR Corporation and AT&T Smart Cards
|
||
have demonstrated a prototype of a new generation of automated
|
||
teller machines (ATMs) they are developing that will use AT&T's
|
||
contactless smart card technology to offer customers additional
|
||
services, like a security system that works by verifying the
|
||
cardholder's voice print.
|
||
The prototype and several potential applications of the new
|
||
terminals are being shown at the Retail Delivery Systems Con-
|
||
ference here this week.
|
||
The two AT&T units also announced that AT&T's smart card
|
||
readers can be connected to NCR's point of sale terminals, and
|
||
that they will begin working with banks to develop new smart
|
||
card-based applications that will run on ATM and point of sale
|
||
machines.
|
||
NCR, a unit of AT&T, is the world's largest supplier of
|
||
ATMs. AT&T Smart Cards is a leading supplier of contactless
|
||
smart cards and applications.
|
||
AT&T contactless smart cards look like other bank cards--
|
||
they're the same size and just as thin--but they have
|
||
microprocessors and memory chips laminated within their plastic
|
||
shells.
|
||
Developed at AT&T Bell Laboratories in the United States,
|
||
their electronic memory can hold the equivalent of several pages
|
||
of typewritten information, personalized to the card's user.
|
||
That data is accessed by a reader/writer device, which, in
|
||
addition to being installed in an ATM, can be connected to a cel-
|
||
lular or wired telephone, personal computer, automobile (for
|
||
electronic toll collection), or other device. Because the reader
|
||
has no moving parts, it is more reliable than contact-card
|
||
readers.
|
||
"Our smart card can be viewed as a secure, portable, per-
|
||
sonal database that will provide banking customers with enhanced
|
||
security and a broad spectrum of new services," said Diane
|
||
Wetherington, president of AT&T Smart Cards.
|
||
{familiar ATM into a new kind of financial transaction
|
||
station," said Jim Adamson, vice president of NCR Self-Service
|
||
and Financial Systems Division in Dundee, Scotland.
|
||
"One obvious benef{ion beyond PINs (per-
|
||
sonal identification numbers), which a thief might be able to
|
||
find out. For example, one of the demonstrations at the Retail
|
||
Delivery Systems Conference will be a voice-based security system
|
||
that works by comparing the cardholder's voice print with one
|
||
stored on the card. Unless the two match, access to the account
|
||
is denied.
|
||
"But that's just the beginning," Adamson adds. "Since much
|
||
of a customer's account information is stored on the card, he or
|
||
she doesn't necessarily need to go to an ATM if all they need to
|
||
do is check that information. You can use a personal computer
|
||
with a smart-card interface, for example, or a similarly equipped
|
||
public telephone.
|
||
"Of course, security features on the card will prevent users
|
||
from changing the information on the card when they are not
|
||
linked to their bank's computer network."
|
||
When customers do go to an ATM, they are given customized
|
||
menu options based on their account profile stored on their smart
|
||
cards. This might even include offering them a connection to a
|
||
financial institution not normally on the ATM network, such as
|
||
a brokerage house where they have a money market account.
|
||
In addition to convenience and security, another benefit of
|
||
using AT&T contactless smart cards with NCR's terminals, is that
|
||
a single card can be used for multiple applications--a solution
|
||
to consumer complaints about the proliferation of cards they need
|
||
to carry around.
|
||
Using AT&T's communications network and NCR's installed base
|
||
as a backbone, AT&T can develop and deploy applications for a
|
||
variety of customers. For example, a single card could serve as
|
||
an ATM card, an insurance information card, and a debit card for
|
||
making purchases in a store, placing phone calls, paying highway,
|
||
bridge and tunnel tolls, paying mass transit fares, and even
|
||
buying from vending machines.
|
||
Funds for each of these uses can be transferred at any ATM
|
||
from the customer's bank account to the debit portion of the
|
||
card. With a smart card reader/writer connected to an NCR point
|
||
of sale terminal, the consumer has access to a full range of pay-
|
||
ment options.
|
||
AT&T smart cards also make it possible for ATMs to expand
|
||
beyond mere banking functions. For example, "electronic tickets"
|
||
for airline travel, sporting events, plays, or concerts could be
|
||
purchased at an ATM and loaded onto the smart card. The card
|
||
would then be accessed at the airport, stadium, theater or con-
|
||
cert hall.
|
||
"The AT&T contactless smart card reader is a perfect example
|
||
of the potential for joint technology development between NCR and
|
||
AT&T," said Adamson.
|
||
AT&T plans to make the smart card interface available to
|
||
other terminal developers, as well.
|
||
NCR, an AT&T company, develops, manufactures, markets,
|
||
supports and services enterprise-wide information systems for
|
||
worldwide markets.
|
||
AT&T Smart Cards, based in Bridgewater, New Jersey, is an
|
||
AT&T strategic business unit that develops and markets smart card
|
||
products and applications.
|
||
The business does all of its development and manufacturing
|
||
in the United States (its factory is located in Little Rock, Ar-
|
||
kansas). AT&T also has a cooperative agreement with Nippondenso
|
||
Co. to market smart card applications in Japan.
|
||
# # #
|
||
NCR is a registered trademark of NCR Corporation
|
||
|
||
ADDITIONAL BACKGROUND ABOUT AT&T'S SMART CARDS
|
||
|
||
AT&T's smart card consists of an 8-bit microcomputer, and
|
||
features its own operating system, 3 kilobytes of electrically
|
||
erasable read-only memory (EEPROM), an asynchronous serial data
|
||
link, and a security system to prevent files from unauthorized
|
||
use.
|
||
AT&T's smart card differs from other smart cards in several
|
||
important ways:
|
||
o It uses a contactless interface to provide power to the card
|
||
and to perform data transfer. Other smart cards have ex-
|
||
posed metallic contacts, which produce reliability problems
|
||
with wear, contamination, and damage due to electrostatic
|
||
discharge. AT&T pioneered a design that allows the smart
|
||
card to transmit data to a card reader without metal-to-
|
||
metal contact. The card transfers data by changing the
|
||
charge on capacitive plates in the card and the reader.
|
||
o The microprocessor uses a flexible, UNIX(TM)-like operating
|
||
system designed specifically for AT&T's smart card. Host
|
||
computers or terminals can interact with the card using
|
||
predefined, high-level software commands.
|
||
o Security is also enhanced by the inclusion of a security al-
|
||
gorithm. Encryption, decryption and message authentication
|
||
can be performed to facilitate secure transmissions over in-
|
||
secure links to and from the host system or terminal.
|
||
o The card's file management architecture allows a number of
|
||
applications to reside on one card. For example, in
|
||
banking, one card can be used to hold information on a
|
||
customer's checking, savings, loan, and line-of-credit ac-
|
||
counts, while also storing biometrics, such as the
|
||
customer's signature, voice and fingerprints for security.
|
||
In addition, that same card can be used for travel or other
|
||
applications.
|
||
o The card has built-in security features. Information stored
|
||
on the card can be isolated in such a way that access to
|
||
data in a particular file on the card can be limited to
|
||
users authorized to access that portion of the card. This
|
||
allows different applications to reside on the same card
|
||
without giving all handlers access to the entire database.
|
||
AT&T smart cards are already being used in several ways:
|
||
|
||
ELECTRONIC TOLL COLLECTION
|
||
Without stopping, drivers approaching a toll plaza insert a
|
||
smart card into a transmitter mounted on their dashboards. In-
|
||
formation stored on the card is transmitted to the toll station
|
||
via radio link, and the cost of each toll is either debited from
|
||
a pre-paid amount on the card or recorded for billing later.
|
||
|
||
PENSION RECORD-KEEPING
|
||
Italy's post office is now using a pension-administration
|
||
system supplied by Olivetti that uses AT&T's smart card as a
|
||
record-keeping device for pensioners.
|
||
|
||
COMPUTER SECURITY
|
||
Other customers are using the AT&T smart card to limit ac-
|
||
cess to computer systems containing proprietary information.
|
||
Authorized users dial into the systems from their portable com-
|
||
puters, and the systems have been programmed to interface with
|
||
a smart card. Without the card, the systems cannot be accessed.
|
||
|
||
BUILDING SECURITY
|
||
AT&T has several applications in the U.S. and Japan in which
|
||
the smart card is used for employee identification and building
|
||
access control.
|
||
But these are just the beginning. The government could use
|
||
smart cards to replace printed food stamps, driver's licenses and
|
||
voter registrations. And a medical smart card could provide a
|
||
physician with a patient's complete and up- to-date medical
|
||
record. The same smart card can also store insurance information
|
||
in a separate file. Having this information on a card would also
|
||
expedite admittance to a hospital.
|
||
"The 1990s is a decade of customization," says Wetherington.
|
||
"Businesses will need to redesign the way information is gathered
|
||
and processed, in part because customers' definitions of ac-
|
||
ceptable service times and intervals are changing.
|
||
In some cases, this will require reengineering where and how
|
||
products and services are delivered. "Smart cards will
|
||
revolutionize personal and business information access and
|
||
processing by providing instant point-of-need transactions," she
|
||
said.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
DEA SECURITY - NOT THAT SECURE!
|
||
|
||
The Government Accounting Office (GAO) has just released a new report
|
||
titled "Computer Security: DEA is Not Adequatly Protecting Sensitive
|
||
Drug Enforcement Data".
|
||
It seems DEA Agents reguraly made standard Security Violations in the
|
||
areas of,
|
||
|
||
1. Sharing Computer Passwords
|
||
2. Left Passwords Taped to Terminals
|
||
3. Used easily identifiable Passwords (Such as "DEA")
|
||
4. Threw out Classified Materials in the Trash
|
||
|
||
So for all you Console Cowboys hacking the DEA, times a Wastin
|
||
these boys know nothing of proper security procedures!
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Section [5]: The Rumor Mill (Unconfirmed Rumors From the Underground)
|
||
Edited By: Mercenary and Anubis
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
The IIRG recieved the following message at Mercenary's mailbox from an
|
||
unidentified user at llwnet.linknet.COM (Cheshire HS) and we found it most
|
||
interesting, We'll explain why afterwards...
|
||
-------------------------------------------------------------------------------
|
||
|
||
LOSER ALERT! LOSER ALERT!
|
||
FROM AN ANONYMOUS PIRATE SYSOP
|
||
------------------------------
|
||
HANDLE: Homicidal
|
||
REAL INFO: Jason L.(IIRG Deleted)
|
||
(IIRG Deleted)
|
||
Wallingford, CT 06492
|
||
(203)(IIRG Deleted)
|
||
AGE: 16
|
||
------------------------------
|
||
This kid is every pirate's nightmare. In his infinite
|
||
stupidity, he lost his access on the one major Connecticut
|
||
pirate board he had access on. Then he wanted revenge. He
|
||
called up the SPA (Software Publishers' Association) piracy
|
||
reporting hotline and the Apogee piracy hotline. He turned in
|
||
several big-time pirate boards. He gave BBS names, BBS
|
||
numbers, Sysops' handles, Sysops' real names, Sysops' voice
|
||
numbers, Sysops' addresses, Sysops' ages, his accounts on
|
||
small-time pirate boards, EVERYTHING! This kid fucked
|
||
EVERYBODY over! Several decent pirate Sysops deleted their
|
||
entire hard drives for fear that the FEDS would come knocking
|
||
at their doors. He shattered the fragile trust that exists
|
||
between the members of Connecticut's pirate community. In a
|
||
taped phone conversation (which was eventually made into a
|
||
Sound blaster VOC and then distributed) he admitted to
|
||
turning in pirate boards and also uploading viruses to
|
||
several BBS's. He also said that his "master plan" consisted
|
||
of bringing down all pirate boards and trashing the local
|
||
modem scene with "outside help from ex-modemers" who
|
||
supposedly hold grudges against current-day users. He turned
|
||
in kids who were hacking Internet also. If this kid ever
|
||
calls your BBS, just fucking delete his punk ass!
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
We didn't know if the information was true as Mercenary is based in CT. and
|
||
He'd heard nothing of any Major BBS Busts or actions in the area.
|
||
But all of a Sudden this appeared in the Paper as well as in CUD 5.03.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
|
||
From the 1-7-93 Issue of The Cheshire Herald (Front Page)
|
||
Typed by Lord Valgamon (YUNSANJ@YALEVM.YCC.YALE.EDU)
|
||
|
||
THREE CHS STUDENTS CHARGED IN BURGLARIES
|
||
Former CHS Student Also Charged in Case
|
||
by Amy Carpenter, Herald Staff
|
||
|
||
Three Cheshire High School students and a former student charged
|
||
with the theft of $23,000 worth of computer and electronic equipment
|
||
from the high school have turned themselves in to Cheshire police.
|
||
|
||
Jared D Bishop, 17, of 500 South Meriden Road, William J Vallo,
|
||
17, of 1081 South Meriden Road, and John Beltrami, 17, of 12 Woodland
|
||
Drive, have each been charged with 6 counts of third-degree burglary,
|
||
6 counts of third-degree conspiracy to
|
||
commit burglary and first-degree larceny by common scheme,
|
||
police said.
|
||
|
||
Brendan Monahan, 17, of Littleton, New Hampshire, was
|
||
charged with third-degree burglary, third-degree conspiracy
|
||
to commit burglary and third-degree larceny, police said.
|
||
|
||
-Lesser Charges
|
||
|
||
Monahan, a former CHS student, received the lesser charges
|
||
because he is believed to have participated in only 1 of 6 burglaries
|
||
at the high school, said Detective Thomas Stretton.
|
||
|
||
Bishop and Vallo turned themselves in last week, and Beltrami and
|
||
Monahan turned themselves in early this week, Stretton said.
|
||
|
||
All four were released to the custody of their parents
|
||
and are scheduled to appear in Meriden Superior Court on
|
||
January 14, police said.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
It seems funny to us that these two incidents would originate from the same
|
||
place, so there may be some validity to the Rumor we recieved.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
IBM WORKING ON SUPER DRIVE?
|
||
|
||
IBM Corporation is rumored to be working on a read/write head for hard-disk
|
||
drives that will propel disk bit densities up into the range of 8 billion bits
|
||
per square inch. Current leading edge Winchesters area densities are in the
|
||
neighborhood of 250 million bits per square inch.
|
||
Even this may fall short of the rumored that students at the University of
|
||
San Diego are working on a head capable of 10 Billion bits per square inch.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
=============================================================================
|
||
|
||
THE GRIM REAPER IS A NARC
|
||
Oh No!, Mr. Narc has kicked me out of TDT!
|
||
|
||
=============================================================================
|
||
|
||
Today at about 6:00 Central time I was talking with my girlfriend.
|
||
I clicked on my call waiting button and it was The Grim Reaper
|
||
(Mike A.(IIRG DELETE). He told me to call him back because his didn't want
|
||
to pay for the phone call. I told him I would call him back in 5 minutes and
|
||
he said fine. I was called back 10 minutes later by Grim and he told me I was
|
||
kicked out.I asked why and he said it was because I hadn't called him
|
||
back. He said I didn't respect him and wasn't loyal to him. He went on and
|
||
on about how I've never done anything for TDT, but now that
|
||
he has kicked me out,I guess I might as well tell everyone the real story
|
||
about The Grim Reaper.
|
||
The truth is Grim is a narc. He is the one who got Mind Bomb nailed.
|
||
He went off on Sought After and has been trying to get him busted for
|
||
a while. His next targets are Renegade Chemist and Butcher. He always
|
||
told me that all other cracking groups would eventually die out. And the
|
||
way this would happen would be through his great ability to narc. Why do
|
||
you all think I followed him from FLT to OFG to TDT? Remember Infinite Range
|
||
Rock? He wasn't loyal to Grim, he was nailed. I've stuck with that fucking
|
||
Narc for 3 groups. He has told me a lot of shit, and now I'm going to tell
|
||
it all to you.
|
||
I have nothing against TDT, I have nothing against Sought After, or
|
||
anyone in the pirate scene. I do have something against Grim. He was the
|
||
person who took the fun out of all the groups I was in. He wanted people
|
||
to fear him. And when I wouldn't kiss his ass he kicked me out.
|
||
Grim didn't even go to court when he got busted with TNSHB. I don't
|
||
know all the details about the deals he cut, but I know he is a narc.
|
||
He is putting out shit about me not doing anything for the group which is
|
||
complete bullshit. People like the Grim Reaper should not be in the pirate
|
||
scene. He kills accounts, he busts people, and ruins BBSing to further
|
||
himself.
|
||
Luckily, I have a life! People like the Grim Reaper who quit
|
||
college, have no job, and no friends to BBS are sorry. I'm going to lay
|
||
low for a while, and just hang out on a few boards. I'm done with groups.
|
||
TDT is and will be my last one. I have a girlfriend, I have school, and
|
||
now I don't have to deal with Grim's bullshit. My warning to guys in TDT
|
||
and the pirate scene. Grim is a NARC, you don't screw with people like
|
||
that. I've learned my lesson. All I can say is get out of TDT. Get out
|
||
from under the thumb of Grim. He will fuck you over.
|
||
|
||
Grim Repear [TDT/NARC] <20><> Go ahead bust me. I can care less. Hell, you can
|
||
even post my address and come to my house. The last time we talked I had
|
||
it .VOC'ed. I kept tabs on you Mike. I'm not going to release it unless
|
||
you try something. Like I said before, I'm not here to take TDT down or
|
||
do any bullshit like that. I'm here to tell the truth. Don't fuck with
|
||
me Mike. The only way to learn from a narc, liar, and thief like you is
|
||
the hard way. I've learned, and now it's over. Go to hell, die, and
|
||
get a life fat ass.
|
||
|
||
Sought After [TDT] <20><> I have nothing against you. You are cool Zach.
|
||
Everything I thought about you was wrong. I was brainwashed by the big
|
||
Narc. Get out while you can. You know he busted Mind Bomb, you were
|
||
on the fucking phone, don't deny it.
|
||
|
||
|
||
|
||
To All <20><> I never tried to break apart TDT after I found out I was kicked
|
||
out. I'm not interested in going after Grim or narcing on him,
|
||
unless he pulls his bullshit on me.
|
||
|
||
|
||
Pepsi Man
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [6]: PHANTASY TIDBITS: News and Views of Interest
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
CELLULAR HIGHWAY ROBBER
|
||
|
||
The LA Times reports that an enetrprising telephone phreak reached out and
|
||
touced someone 11,7333 times in August from a freeway emergency callbox in
|
||
Orange County,California.
|
||
The System that monitors the emergency callboxes attributed 25,875 minutes of
|
||
calls to the unknown phreak to points all over the globe.
|
||
The Phreak apparently succeeded in making the calls by matching the callboxes
|
||
electronic serial number.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
PHANTASY MAKES HONORABLE MENTION
|
||
|
||
Phantasy Magazine has been mentioned in Mondo 2000's new Book, "A Users
|
||
Guide to the New Edge" on Page 286.
|
||
Phantasy is Mentioned along with ATI,PHRACK,And The Syndicate Report
|
||
under the Catagory of Zines On-Line.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
WIRED MAGAZINE PREMIERES
|
||
|
||
Be on the lookout for a new Mondo 2000 look-alike Magazine, "WIRED" on sale
|
||
at newstands now. The first issue appears well written and contains several
|
||
articles of interest including "Cellular Phreaks and Code Dudes" and "War is
|
||
Virtual Hell" by Bruce Sterling.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
TIME MAGAZINE ARTICLE
|
||
|
||
For other collectors of information, be sure to grab the Feb. 8 edition of
|
||
time magazine and check out the cover story article on Cyberpunks.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
FREE VIRTUAL SEX POSTER
|
||
|
||
Get a FREE poster of the Virtual Sex Scene in the "LAWNMOWER MAN" by
|
||
calling 1-800-858-1810 and ask for Department C76.
|
||
This is a free promotional offer from CYPRESS SEMICONDUCTOR and they will
|
||
send along a copy of there Data Book with the poster.
|
||
They may ask if you have time to answer a few questions as they did when we
|
||
called, they're just looking for Company Background Info.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
NCSA FREE BOOK OFFER
|
||
|
||
The National Computer Security Association will send you a FREE copy of
|
||
their "Information Security Wishbook" and may be obtained by calling
|
||
(717)258-1816.
|
||
We've obtained a copy of the book and its roughly a 24 page catalog of
|
||
Books,Newsletters,and Research Reports with some "DISINFORMATION" charts
|
||
thrown in to scare the novice system operator.
|
||
|
||
For Example;
|
||
|
||
|
||
Number of Hacker Attacks on US Workplace Computers
|
||
|
||
|
||
350,000 in 1989
|
||
395,000 in 1990
|
||
675,000 in 1991
|
||
|
||
Come on Guys. Give us a break Name the Companies that reported 675,000
|
||
attacks individualy and I'll eat your Jock Strap.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
INFORMATION REQUESTS
|
||
|
||
At the IIRG, we often recieve strange,bizarre, and sometimes normal
|
||
requests. Although Mercenary does'nt have the time to answer everyone
|
||
individually. He hopes to answer some of your Questions here as we recieve
|
||
them.
|
||
|
||
1. Where can I get Info on Cellular Phreaking.
|
||
|
||
Mercenary Reply: There are numerous files on Cellular Phreaking and Hardware
|
||
hacking available on any larger Hack/Phreak BBS.
|
||
If you don't want to spend the time looking for them I would
|
||
suggest sending $49.95 plus $4.00 S/H to:
|
||
|
||
DYNASPEK
|
||
P.O. Box 564
|
||
Westmont,IL 60559
|
||
|
||
or COD orders may call (708)-971-1585
|
||
For your cash, They will send you a copy of,
|
||
"The Cellular Telephone Hackers Guidebook" and this should
|
||
guide you through the basics.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [7]: IIRG Distribution Sites
|
||
(or Gateways to Oblivion)
|
||
|
||
|
||
|
||
////// ////// /////// ////////
|
||
// // // // //
|
||
// // /////// // ////
|
||
// // // // // //
|
||
////// * ////// * // // * /////////
|
||
|
||
|
||
|
||
|
||
IIRG World HQ: Dark Shadows
|
||
19.2/9600 Baud HST
|
||
24 Hours a Day
|
||
1.2 Gigs Online
|
||
Sysop: Anubis
|
||
2 Nodes
|
||
(203)-PRI-VATE
|
||
(TEMP DOWN AT THIS TIME)
|
||
|
||
|
||
IIRG Distribution Site 1: Wired World BBS
|
||
INC Europe
|
||
TPC Courier (WHQ)
|
||
THP
|
||
IIRG Distribution Site
|
||
Sysop: Digital Justice
|
||
+39-89-254138
|
||
|
||
IIRG Distribution Site 2: Cyberdyne Network Germany
|
||
United Forces
|
||
Sysop: E605
|
||
+49-5341-59004
|
||
+49-5341-54052
|
||
|
||
|
||
IIRG Distribution Site 3: The Sanitarium
|
||
Sysops: Morbid Angel [INC/ACID]
|
||
Spectral Illusion [ACID/RAZOR]
|
||
IIRG Distribution Site
|
||
ACID Member Board
|
||
INC Courier Board
|
||
RAZOR 1911 Courier Board
|
||
VISA World Headquarters
|
||
(817)PRI-VATE
|
||
|
||
IIRG Distribution Site 4: The WareHouse
|
||
(203)-231-8589 14.4
|
||
(203)-231-8588 9600
|
||
OVER A GIG ONLINE
|
||
Sysop: Ionizer
|
||
|
||
IIRG Distribution Site 5: The Rune Stone BBS
|
||
14.4k HST
|
||
Phantasys Home Board
|
||
Complete IIRG Archives
|
||
Invitation Only
|
||
(203)-PRI-VATE
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [8]: Phantasy Distribution Sites
|
||
|
||
Phantasy's Distribution Site's are continually growing,we apologize if you
|
||
called a board and didn't find the Mag. Network Distribution Sites will
|
||
have the Issues first, we suggest calling one of them if a problem does
|
||
arise.
|
||
|
||
|
||
1. Lightning Systems
|
||
(414) 363-4282
|
||
Sixty Million Bytes OnLine
|
||
USRobotics Dual Standard HST/V.32bis
|
||
2400 thru 14.4k v.32bis/HST
|
||
|
||
2. Sycamore Elite
|
||
19,200-1200 Baud HST, 24 Hours a day
|
||
(815) 895-5573
|
||
|
||
3. The Works BBS
|
||
(617-861-8976)
|
||
Large Text Files BBS, 3500+ text files online.
|
||
2400-300 Baud, 24 Hours a day
|
||
|
||
4. Pipers Pit BBS
|
||
19,200-9600 HST ONLY!!
|
||
24 Hours a Day
|
||
THG Distro Site 1300 Megs
|
||
(203)PRI-VATE [2 Nodes]
|
||
(Please Note, Numbers have Changed at Pipers Pit)
|
||
|
||
5. The Dickinson Nightlight
|
||
(713)-337-1452
|
||
Der WeltanSchauung Distro Site (World View Magazine)
|
||
Phantasy Distro Site
|
||
|
||
6. RIPCO II BBS
|
||
(312)-528-5020
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [9]: IIRG SPECIAL ANNOUNCEMENT
|
||
|
||
The IIRG has just released The IIRG's Acronym List [V7.00] and should be
|
||
available on a H/P BBS near you.
|
||
Also for IIRG members the New IIRG Member Encryption System has been
|
||
released and can be Picked up on The Rune Stone BBS.
|
||
The IIRG shall be releasing around June, the IIRG's Hackers Survival
|
||
Guide for the 90's, note withstanding any problems with Mercenary's move.
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
PHANTASY(C) IIRG 1991,1992,1993
|
||
May Odin Guide Your Way!
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|